Question 6 of 169
After an information security incident, an organization created a comprehensive backup procedure involving regular, automated backups of all critical data to offsite storage locations. By doing so, which principle of information security is the organization applying in this case?
Correct Answer: C

Question 7 of 169
A data processing tool crashed when a user added more data to the buffer than its storage capacity allows. The incident was caused by the tool's inability to bound check arrays. What kind of vulnerability is this?
Correct Answer: A

Question 8 of 169
Which of the following best defines managerial controls?
Correct Answer: A

Question 9 of 169
What is the objective of penetration testing in the risk assessment process?
Correct Answer: B

Question 10 of 169
Which controls are related to the Annex A controls of ISO/IEC 27001 and are often selected from other guides and standards or defined by the organization to meet its specific needs?
Correct Answer: A